Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 11:33
Behavioral task
behavioral1
Sample
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
Resource
win10v2004-20220812-en
General
-
Target
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe
-
Size
584KB
-
MD5
11a2f493604e36030ce9d0ccb4487ae0
-
SHA1
e39e9e619185b8873cb9179231cb59b25be0f9f3
-
SHA256
e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916
-
SHA512
1188f7802dba3f1712938840e0f85424812cb890f9e0b8d089e839ccb33068d81f99d36228b75e7bdcbe0cd1034ccf68b0295711ac7d799eba17ffc30efc1894
-
SSDEEP
12288:frxC+a9jEXiDcu4nalJRdgHZoEXRs/4v+o:frE9jEy76KP6vhs/I+
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat aspack_v212_v242 behavioral1/files/0x00140000000054ab-58.dat aspack_v212_v242 behavioral1/files/0x0009000000012317-66.dat aspack_v212_v242 behavioral1/files/0x0009000000012317-67.dat aspack_v212_v242 behavioral1/files/0x000800000001231e-74.dat aspack_v212_v242 behavioral1/files/0x000800000001231e-75.dat aspack_v212_v242 behavioral1/files/0x0008000000012326-80.dat aspack_v212_v242 behavioral1/files/0x0008000000012326-81.dat aspack_v212_v242 behavioral1/files/0x0006000000015cb1-91.dat aspack_v212_v242 behavioral1/files/0x0006000000015cb1-92.dat aspack_v212_v242 behavioral1/files/0x0006000000016cf8-97.dat aspack_v212_v242 behavioral1/files/0x0006000000016cf8-98.dat aspack_v212_v242 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1968 09c00787.exe 1168 QQBrowserSetup[1].exe -
Sets DLL path for service in the registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ias\Parameters\ServiceDll = "C:\\Windows\\system32\\Ias.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "C:\\Windows\\system32\\Irmon.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Nla\Parameters\ServiceDll = "C:\\Windows\\system32\\Nla.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Ntmssvc\Parameters\ServiceDll = "C:\\Windows\\system32\\Ntmssvc.dll" 09c00787.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\NWCWorkstation\Parameters\ServiceDll = "C:\\Windows\\system32\\NWCWorkstation.dll" 09c00787.exe -
resource yara_rule behavioral1/files/0x00140000000054ab-56.dat upx behavioral1/files/0x00140000000054ab-58.dat upx behavioral1/memory/1968-59-0x00000000009B0000-0x00000000009FE000-memory.dmp upx behavioral1/memory/1968-60-0x00000000009B0000-0x00000000009FE000-memory.dmp upx behavioral1/memory/1392-61-0x0000000001120000-0x00000000011BA000-memory.dmp upx behavioral1/memory/1968-63-0x00000000009B0000-0x00000000009FE000-memory.dmp upx behavioral1/memory/1968-64-0x0000000000140000-0x000000000018E000-memory.dmp upx behavioral1/memory/1968-65-0x0000000000140000-0x000000000018E000-memory.dmp upx behavioral1/files/0x0009000000012317-66.dat upx behavioral1/files/0x0009000000012317-67.dat upx behavioral1/memory/1592-69-0x0000000074750000-0x000000007479E000-memory.dmp upx behavioral1/memory/1592-70-0x0000000074750000-0x000000007479E000-memory.dmp upx behavioral1/memory/1592-71-0x0000000074750000-0x000000007479E000-memory.dmp upx behavioral1/files/0x000800000001231e-74.dat upx behavioral1/files/0x000800000001231e-75.dat upx behavioral1/memory/1948-77-0x00000000740C0000-0x000000007410E000-memory.dmp upx behavioral1/memory/1948-78-0x00000000740C0000-0x000000007410E000-memory.dmp upx behavioral1/memory/1948-79-0x00000000740C0000-0x000000007410E000-memory.dmp upx behavioral1/files/0x0008000000012326-80.dat upx behavioral1/files/0x0008000000012326-81.dat upx behavioral1/memory/1516-84-0x0000000074530000-0x000000007457E000-memory.dmp upx behavioral1/memory/1516-85-0x0000000074530000-0x000000007457E000-memory.dmp upx behavioral1/memory/1516-83-0x0000000074530000-0x000000007457E000-memory.dmp upx behavioral1/files/0x0006000000015cb1-91.dat upx behavioral1/files/0x0006000000015cb1-92.dat upx behavioral1/memory/1412-95-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/memory/1412-94-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/memory/1412-96-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/files/0x0006000000016cf8-97.dat upx behavioral1/files/0x0006000000016cf8-98.dat upx behavioral1/memory/1624-102-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/memory/1624-101-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/memory/1624-100-0x0000000073D60000-0x0000000073DAE000-memory.dmp upx behavioral1/memory/1968-104-0x0000000000140000-0x000000000018E000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1592 svchost.exe 1948 svchost.exe 1516 svchost.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1412 svchost.exe 1624 svchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA QQBrowserSetup[1].exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe File opened for modification \??\PhysicalDrive0 QQBrowserSetup[1].exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ias.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Irmon.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Nla.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\Ntmssvc.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\NWCWorkstation.dll 09c00787.exe File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 09c00787.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserMachineCode\MachineGuid = "6D51D6603269DDAE70E7917F8781A355" QQBrowserSetup[1].exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\BrowserMachineCode QQBrowserSetup[1].exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1968 09c00787.exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe 1168 QQBrowserSetup[1].exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1968 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 28 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35 PID 1392 wrote to memory of 1168 1392 e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe"C:\Users\Admin\AppData\Local\Temp\e5ece5bec30501f237bac4eb55afe71d6dc79c8609ca9c45862f5faa62aa1916.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\09c00787.exeC:\09c00787.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\QQBrowserSetup[1].exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\QQBrowserSetup[1].exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1592
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1516
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1624
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5d5dbb416cc6ab7b22b8af372459e0d27
SHA1228fbbee6c621794f98442bf2bc1a557f982a333
SHA2567a19f3e148632551c6a26ef79d349fb6474d80ec9337e001da56ffd0d7ea7d37
SHA51232c89df85d1e7df6b62643d89225542eee6a2cf3a13fc4dea779adb66baf188396bac829fc821498081166b530fdbc79fbb903d612baefcbc5496222b4d192d7
-
Filesize
240KB
MD5d5dbb416cc6ab7b22b8af372459e0d27
SHA1228fbbee6c621794f98442bf2bc1a557f982a333
SHA2567a19f3e148632551c6a26ef79d349fb6474d80ec9337e001da56ffd0d7ea7d37
SHA51232c89df85d1e7df6b62643d89225542eee6a2cf3a13fc4dea779adb66baf188396bac829fc821498081166b530fdbc79fbb903d612baefcbc5496222b4d192d7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\QQBrowserSetup[1].exe
Filesize41.6MB
MD55c2e4963c3ebc4b7af6bbfacd5885ac7
SHA1a6d362b187c8063c689785311adc58d92475e3bd
SHA25688b32113f851038b46b78a95aa42317a02dc4d4b6768d4481460cfc23c05e3b3
SHA512bd0f1604dfde22763c083e0fd7078e674cead1feb1712401fdcc7e3a9359e7708675c91fa000e24a488326ec04587d181084cfd02d8594ec24682edbd842c85b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\QQBrowserSetup[1].exe
Filesize41.1MB
MD50e229b5bd856babbb87e6d1fe483a55d
SHA1acac41b3e1bd48417c70dd3820792bb83a4b0b56
SHA256069076d7ea9a5cda62dbe59d77295bb7449272b90650f8c57ea9d280ea1d597d
SHA512cf10cebe778e8eab48ac13a7d32cdc62dd17b55e9867fd3273770f1d7c746f07dee53e90b733a1dbc7bd8afdafafbc3efec296bbc9b8301ceb14538d489e7f86
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BG9XQTG0\QQBrowserSetup[1].exe
Filesize42.2MB
MD57435ac9efe1be0176e8f00ee45b22230
SHA1835bc3ffd4442afced8d310286d34e590b8cbd04
SHA25657a22a14c380a4b263f74e44dd33de03f7c7d784d2ae64d5fb063cc69c10f3ca
SHA51217c99344ee88d03b816f7cbd3b13103f5b42434d37406b4f45c0e286b93387b3bacef461a9febf367f647c30579c613aec47008458f3ead2cccd6b4e337c2183
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb
-
Filesize
240KB
MD522283ef82fb788e2f2a72e9c43c589e4
SHA188881a32b8c22e7a14f54822d5241c1ddfeb4a94
SHA25649e31d4cae02ede20b93a89126e53280121aeba635a498be76050b96478eeb0d
SHA5126134aaa9456b18592419e53dd061f1e0f88f702a76b445125c55c51e346c2c2bf6bfa60ffecee0f39e39253b382c172e0d736a5d83d2b9c2363eea21f34c31bb